-
1
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
17 Dec. 2007
-
Boyd D. M. and Ellison N. B. 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication. 13, 1(17 Dec. 2007), 210-230. DOI= 10.1111/j.1083-6101.2007.00393.x.
-
(2007)
Journal of Computer-Mediated Communication
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.M.1
Ellison, N.B.2
-
2
-
-
84938677423
-
-
Accessed: 2014-05-03
-
Statistics of Social Networking Sites: http://expandedramblings.com/index.php/resource-how-manypeople-use-the-top-social-media. Accessed: 2014-05-03.
-
Statistics of Social Networking Sites
-
-
-
3
-
-
79952797371
-
Towards active detection of identity clone attacks in online social networks
-
ACM, New York, USA
-
Jin L., Takabi H. and Joshi James B. D. 2011. Towards Active Detection of Identity Clone Attacks in Online Social Networks. In Proceedings of the first ACM conference on Data and application security and privacy (CODASPY'11), ACM, New York, USA, 27-38.
-
(2011)
Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY'11)
, pp. 27-38
-
-
Jin, L.1
Takabi, H.2
Joshi James, B.D.3
-
4
-
-
34848911641
-
Social phishing
-
Oct. 2007, ACM, New York, USA
-
Jagatic T., Johnson N., Jakobsson M. and Menczer F. 2007. Social phishing, Communications of the ACM Journal. 50, 10(Oct. 2007), ACM, New York, USA, 94-100. DOI= 10.1145/1290958.1290968.
-
(2007)
Communications of the ACM Journal
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
5
-
-
84938723913
-
-
Accessed: 2014-04-23
-
Spam Attacks Information: http://www.whoswatchingcharlottesville.org/social.html. Accessed: 2014-04-23.
-
Spam Attacks Information
-
-
-
7
-
-
84938723914
-
-
Accessed: 2014-04-23
-
Hacking of Twitter accounts: http://BBC News - AP Twitter account hacked in fake 'White House blasts' post.html. Accessed: 2014-04-23.
-
Hacking of Twitter Accounts
-
-
-
8
-
-
84938723914
-
-
Accessed: 2014-04-23
-
Hacking of Twitter accounts: http://Twitter resets a quarter of a million accounts after hacker attack.html. Accessed: 2014-04-23.
-
Hacking of Twitter Accounts
-
-
-
9
-
-
84938677423
-
-
Accessed: 2014-04-23
-
Statistics of Social Networking Sites: http://expandedramblings.com/index.php/march-2013-by-thenumbers-a-few-amazing-twitter-stats/3/#. U3xVv9KSyuE. Accessed: 2014-04-23.
-
Statistics of Social Networking Sites
-
-
-
10
-
-
82955190606
-
Analyzing facebook privacy settings: User expectations vs reality
-
ACM, New York, NY, USA
-
Liu Y., Gummadi K., Krishnamurthy B. and Mislove A. 2011. Analyzing facebook privacy settings: User expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. ACM, New York, NY, USA, 61-70. DOI= 10.1145/2068816.2068823.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 61-70
-
-
Liu, Y.1
Gummadi, K.2
Krishnamurthy, B.3
Mislove, A.4
-
11
-
-
84870799758
-
Poster: Preliminary analysis of Google+'s privacy
-
ACM, New York, NY, USA
-
Mahmood S. and Desmedt Y. 2011. Poster: preliminary analysis of Google+'s privacy. In Proceedings of the 18th ACM conference on Computer and communications security. ACM, New York, NY, USA, 809-812. DOI= 10.1145/2046707.2093499.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 809-812
-
-
Mahmood, S.1
Desmedt, Y.2
-
12
-
-
84938723915
-
-
Accessed: 2014-03-12
-
Facebook Policies: http://developers.facebook.com/policy. Accessed: 2014-03-12.
-
Facebook Policies
-
-
-
13
-
-
84938698621
-
-
Accessed: 2014-03-12
-
ZoneAlarm: http://www.zonealarm.com. Accessed: 2014-03-12.
-
ZoneAlarm
-
-
-
14
-
-
84938723916
-
-
Accessed: 2014-03-12
-
W. Defensio: http://www.defensio.com. Accessed: 2014-03-12.
-
W. Defensio
-
-
-
15
-
-
84938723917
-
-
Accessed: 2014-03-12
-
UnitedParents: http://www.unitedparents.com. Accessed: 2014-03-12.
-
UnitedParents
-
-
-
16
-
-
84938723918
-
-
Accessed: 2014-03-12
-
G. ReclaimPrivacy: http://www.reclaimprivacy.org. Accessed: 2014-03-12.
-
G. ReclaimPrivacy
-
-
-
18
-
-
77956044597
-
Uncovering social spammers: Social honeypots + machine learning
-
New York, ACM, New York, NY, USA
-
Lee K., Caverlee J. and Webb S. 2010. Uncovering Social Spammers: Social Honeypots + Machine Learning. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval. New York, ACM, New York, NY, USA, 435-442. DOI=10.1145/1835449.1835522.
-
(2010)
Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 435-442
-
-
Lee, K.1
Caverlee, J.2
Webb, S.3
-
19
-
-
84860848688
-
Detecting spammers on twitter
-
Washington, US
-
Benevenuto F., Magno G., Rodrigues T. and Almeida V. 2010. Detecting Spammers on Twitter, In Proceedings of Seventh annual Collaboration, Electronic messaging, Anti Abuse and Spam Conference (CEAS 2010). Washington, US.
-
(2010)
Proceedings of Seventh Annual Collaboration, Electronic Messaging, Anti Abuse and Spam Conference (CEAS 2010)
-
-
Benevenuto, F.1
Magno, G.2
Rodrigues, T.3
Almeida, V.4
-
21
-
-
77958488685
-
Detecting spam bots in online social networking sites: A machine learning approach
-
Springer Berlin Heidelberg
-
Wang A. 2010. Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. Data and Applications Security and Privacy XXIV, LNCS, Springer Berlin Heidelberg. 6166, 335-342. DOI= 10.1007/978-3-642-13739-6-25.
-
(2010)
Data and Applications Security and Privacy XXIV, LNCS
, vol.6166
, pp. 335-342
-
-
Wang, A.1
-
24
-
-
80052767040
-
Spam detection on Twitter using traditional classifiers
-
Springer-Verlag Berlin, Heidelberg
-
McCord M. and Chuah M. 2011. Spam Detection on Twitter Using Traditional Classifiers, Autonomic and Trusted Computing. Lecture Notes in Computer Science, Springer-Verlag Berlin, Heidelberg, 6906, 175-186. DOI= 10.1007/978-3-642-23496-5-13.
-
(2011)
Autonomic and Trusted Computing. Lecture Notes in Computer Science
, vol.6906
, pp. 175-186
-
-
McCord, M.1
Chuah, M.2
-
25
-
-
84868089771
-
An MCL-based approach for spam profile detection in online social networks
-
Liverpool, United Kingdom United Kingdom, June 25-June 27, IEEE
-
Ahmed F. and Abulaish M. 2012. An MCL-Based Approach for Spam Profile Detection in Online Social Networks, In Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (Liverpool, United Kingdom United Kingdom, June 25-June 27), IEEE, 602-608. DOI= http://doi.ieeecomputersociety.org/10.1109/TrustCom.2012.8 3.
-
(2012)
Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications
, pp. 602-608
-
-
Ahmed, F.1
Abulaish, M.2
-
27
-
-
84874776051
-
CATS: Characterizing automation of twitter spammers
-
Bangalore, IEEE
-
th International Conference Communication Systems and Networks (COMSNETS), Bangalore, IEEE, 1-10. DOI= 10.1109/COMSNETS.2013.6465541.
-
(2013)
th International Conference Communication Systems and Networks (COMSNETS)
, pp. 1-10
-
-
Amleshwaram, A.1
Reddy, N.2
Yadav, S.3
Gu, G.4
Yang, C.5
-
29
-
-
84880557073
-
Empirical evaluation and new design for fighting evolving twitter spammers
-
August 2013
-
Yang C., Harkreader R. and Guofei Gu 2013. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. IEEE Transactions on Information Forensics and Security, 8, 8(August 2013), 1280-1293. DOI= 10.1109/TIFS.2013.2267732.
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.8
, pp. 1280-1293
-
-
Yang, C.1
Harkreader, R.2
Gu, G.3
-
30
-
-
84878359270
-
A generic statistical approach for spam detection in Online Social Networks
-
Elsevier, April 2013
-
Ahmed F. and Abulaish M. 2013. A generic statistical approach for spam detection in Online Social Networks. Computer Communications Journal, Elsevier, 36, 10-11(April 2013), 1120-1129. DOI= 10.1016/j.comcom.2013.04.004.
-
(2013)
Computer Communications Journal
, vol.36
, Issue.10-11
, pp. 1120-1129
-
-
Ahmed, F.1
Abulaish, M.2
-
31
-
-
79958043518
-
Detecting social network profile cloning
-
21-25 March 2011, Seattle, WA IEEE
-
Kontaxis G., Polakis I., Ioannidis S. and Markatos E. 2011. Detecting Social Network Profile Cloning. In Proceedings of International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) (21-25 March 2011, Seattle, WA) IEEE, 295-300. DOI= 10.1109/PERCOMW.2011.5766886.
-
(2011)
Proceedings of International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
, pp. 295-300
-
-
Kontaxis, G.1
Polakis, I.2
Ioannidis, S.3
Markatos, E.4
-
32
-
-
82955161549
-
Uncovering social network sybils in the wild
-
New York, USA
-
Yang Z., Wilson C., Wang X., Gao T., Zhao B. and Dai Y. 2011. Uncovering Social Network Sybils in the Wild. In Proceedings of the ACM SIGCOMM conference on Internet measurement conference (IMC'11), New York, USA, 259-268. DOI= 10.1145/2068816.2068841.
-
(2011)
Proceedings of the ACM SIGCOMM Conference on Internet Measurement Conference (IMC'11)
, pp. 259-268
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.5
Dai, Y.6
-
33
-
-
84874283752
-
Studying user footprints in different online social networks
-
Istanbul Turkey, August 26-29, 2012, IEEE/ACM
-
Malhotra A., Totti L., Meira W., Kumaraguru P. and Almeida V. 2012. Studying User Footprints in Different Online Social Networks. In Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), (Istanbul Turkey, August 26-29, 2012), IEEE/ACM, 1065-1070. DOI= http://doi.ieeecomputersociety.org/10.1109/ASONAM.2012. 184.
-
(2012)
Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
, pp. 1065-1070
-
-
Malhotra, A.1
Totti, L.2
Meira, W.3
Kumaraguru, P.4
Almeida, V.5
-
34
-
-
84874260034
-
FakeBook: Detecting fake profiles in on-line social networks
-
Istanbul Turkey, August 26-29, 2012, IEEE/ACM
-
Conti M., Poovendran R. and Secchiero M. 2012. FakeBook: Detecting Fake Profiles in On-line Social Networks. In Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), (Istanbul Turkey, August 26-29, 2012), IEEE/ACM, 1071-1078. DOI= http://doi.ieeecomputersociety.org/10.1109/ASONAM.2012.185.
-
(2012)
Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
, pp. 1071-1078
-
-
Conti, M.1
Poovendran, R.2
Secchiero, M.3
-
35
-
-
84893273434
-
Strangers intrusion detection - Detecting spammers and fake profiles in social networks based on topology anomalies
-
Fire M., Katz G. and Elovici Y. 2012. Strangers Intrusion Detection - Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies. ASE Human Journal. 26-39.
-
(2012)
ASE Human Journal
, pp. 26-39
-
-
Fire, M.1
Katz, G.2
Elovici, Y.3
-
36
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
USENIX Association Berkeley, CA, USA
-
Cao Q., Sirivianos M., Yang X. and Pregueiro T. 2012. Aiding the Detection of Fake Accounts in Large Scale Social Online Services. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI'12), USENIX Association Berkeley, CA, USA.
-
(2012)
Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12)
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
37
-
-
84875624889
-
Searching for spam: Detecting fraudulent accounts via web search
-
Springer-Verlag Berlin Heidelberg
-
Flores M. and Kuzmanovic A. 2013. Searching for Spam: Detecting Fraudulent Accounts via Web Search. Lecture Notes in Computer Science (LNCS), Springer-Verlag Berlin Heidelberg, 7799, 208-217. DOI= 10.1007/978-3-642-36516-4-21.
-
(2013)
Lecture Notes in Computer Science (LNCS)
, vol.7799
, pp. 208-217
-
-
Flores, M.1
Kuzmanovic, A.2
-
38
-
-
84904429895
-
COMPA: Detecting compromised accounts on social networks
-
CA, United States 23 Apr. 2013
-
Egele M., Stringhini G., Kruegel C., Vigna G. 2013. COMPA: Detecting Compromised Accounts on Social Networks. In Proceedings of Network and Distributed System Security Symposium (NDSS), CA, United States (23 Apr. 2013).
-
(2013)
Proceedings of Network and Distributed System Security Symposium (NDSS)
-
-
Egele, M.1
Stringhini, G.2
Kruegel, C.3
Vigna, G.4
-
39
-
-
78751502334
-
Detecting spammers on social networks
-
Austin, Texas USA, University of California, Santa Barbara, ACM
-
Stringhini G., Kruegel C. and Vigna G. 2010. Detecting Spammers on Social Networks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC'10, Austin, Texas USA, University of California, Santa Barbara, ACM, 1-9. DOI= 10.1145/1920261.1920263.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC'10
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
40
-
-
84938723921
-
Discovering spammers in social networks
-
Zhuy Y., Wang X., Zhong E., Liuy N. N., Li H. and Yang Q. Discovering Spammers in Social Networks. In Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence. DOI= 10.1.1.298.8002.
-
Proceedings of the Twenty-sixth AAAI Conference on Artificial Intelligence
-
-
Zhuy, Y.1
Wang, X.2
Zhong, E.3
Liuy, N.N.4
Li, H.5
Yang, Q.6
-
41
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
2009, April 20-24, 2009, Madrid, Spain, ACM
-
Bilge L., Strufe T., Balzarotti D., and Kirda E. 2009. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In Proceedings of International World Wide Web Conference Committee (IW3C2), WWW 2009, (April 20-24, 2009, Madrid, Spain), ACM, 551-560. DOI= 10.1145/1526709.1526784.
-
(2009)
Proceedings of International World Wide Web Conference Committee (IW3C2)
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
42
-
-
84938723922
-
-
Accessed: 2014-03-20
-
Twitter Policy of Spammers: http://help. twitter.com/forums/26257/entries/1831-The Twitter Rules. Accessed: 2014-03-20.
-
Twitter Policy of Spammers
-
-
-
43
-
-
84855249570
-
-
Accessed: 2014-03-23
-
Twitter API: https://dev. twitter.com/docs/rate-limiting/1.1. Accessed: 2014-03-23.
-
Twitter API
-
-
-
44
-
-
84938683315
-
-
Accessed: 2014-03-23
-
Twitter rate limit for calls: https://dev. twitter.com/docs/api/streaming. Accessed: 2014-03-23.
-
Twitter Rate Limit for Calls
-
-
-
45
-
-
84958551577
-
Friend or foe: Twitter users under magnification
-
Sharma A., Ahluwalia A., Deep S. and Bansal D. 2014. Friend or Foe: Twitter Users under Magnification, Distributed Computing and Internet Technology, Lecture Notes in Computer Science, 8337, 251-262. DOI= 10.1007/978-3-319-04483-5-26.
-
(2014)
Distributed Computing and Internet Technology, Lecture Notes in Computer Science
, vol.8337
, pp. 251-262
-
-
Sharma, A.1
Ahluwalia, A.2
Deep, S.3
Bansal, D.4
-
46
-
-
1542400030
-
Predicting subcellular localization of proteins using machine-learned classifiers
-
Lu Z. 2004. Predicting Subcellular Localization of Proteins using Machine-Learned Classifiers. Bioinformatics, 20, 4, 547-556. DOI= 10.1.1.131.4463.
-
(2004)
Bioinformatics
, vol.20
, Issue.4
, pp. 547-556
-
-
Lu, Z.1
|